{"id":"https://openalex.org/W7136418382","doi":"https://doi.org/10.46586/tosc.v2026.i1.5-30","title":"Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model","display_name":"Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136418382","doi":"https://doi.org/10.46586/tosc.v2026.i1.5-30"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2026.i1.5-30","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.5-30","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12776/12465","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12776/12465","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117456165","display_name":"Beno\u00eet Cogliati","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140930","display_name":"Thales (France)","ror":"https://ror.org/04emwm605","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210140930"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Beno\u00eet Cogliati","raw_affiliation_strings":["Thales DIS France SAS, Meudon, France"],"affiliations":[{"raw_affiliation_string":"Thales DIS France SAS, Meudon, France","institution_ids":["https://openalex.org/I4210140930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129546266","display_name":"Simon Demarty","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I195731000","display_name":"Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines","ror":"https://ror.org/03mkjjy25","country_code":"FR","type":"education","lineage":["https://openalex.org/I195731000","https://openalex.org/I277688954"]},{"id":"https://openalex.org/I277688954","display_name":"Universit\u00e9 Paris-Saclay","ror":"https://ror.org/03xjwb503","country_code":"FR","type":"education","lineage":["https://openalex.org/I277688954"]},{"id":"https://openalex.org/I4210155549","display_name":"Laboratoire de Math\u00e9matiques Blaise Pascal","ror":"https://ror.org/05sd5r855","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I198244214","https://openalex.org/I4210141950","https://openalex.org/I4210155549"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Simon Demarty","raw_affiliation_strings":["Thales DIS France SAS, Meudon, France; Laboratoire de Math\u00e9matiques de Versailles, UVSQ, CNRS, Universit\u00e9 Paris-Saclay, 78035 Versailles, France"],"affiliations":[{"raw_affiliation_string":"Thales DIS France SAS, Meudon, France; Laboratoire de Math\u00e9matiques de Versailles, UVSQ, CNRS, Universit\u00e9 Paris-Saclay, 78035 Versailles, France","institution_ids":["https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4210155549","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5117456165"],"corresponding_institution_ids":["https://openalex.org/I4210140930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.90482484,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":"5","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7508000135421753,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7508000135421753,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.15520000457763672,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.02969999983906746,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6798999905586243},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.6276000142097473},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.5536999702453613},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5457000136375427},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.35249999165534973},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.3379000127315521}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6798999905586243},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.6276000142097473},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.5536999702453613},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5457000136375427},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.48089998960494995},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.47609999775886536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.461899995803833},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38760000467300415},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.35249999165534973},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.2994999885559082},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.2827000021934509},{"id":"https://openalex.org/C22597639","wikidata":"https://www.wikidata.org/wiki/Q5449227","display_name":"Filter design","level":3,"score":0.2815999984741211},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.25920000672340393},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2026.i1.5-30","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.5-30","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12776/12465","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:22f8bea3f64048378c830a1bf068d009","is_oa":true,"landing_page_url":"https://doaj.org/article/22f8bea3f64048378c830a1bf068d009","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2026, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2026.i1.5-30","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.5-30","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12776/12465","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3514550006","display_name":null,"funder_award_id":"Centre","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4328594756","display_name":"Privacy preserving identity management for digital wallet and secure data sharing and processing for cyber Threat intelligence data","funder_award_id":"101167964","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136418382.pdf","grobid_xml":"https://content.openalex.org/works/W7136418382.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"At":[0],"Eurocrypt\u201916,":[1],"M\u00e9aux":[2],"et":[3,51,55],"al.":[4,52,56],"designed":[5],"a":[6,27,96,124,139],"construction":[7,38,109,147],"for":[8,117,142],"symmetric":[9],"ciphers":[10],"that":[11,99,106,121,128],"can":[12],"be":[13],"efficiently":[14],"evaluated":[15],"with":[16],"Fully":[17],"Homomorphic":[18],"Encryption,":[19],"dubbed":[20],"Filter":[21,30,69,74,86,126,145],"Permutator.":[22],"They":[23],"also":[24],"specify":[25],"FLIP,":[26],"family":[28],"of":[29,44,60,67,84],"Permutators.":[31,75],"Creating":[32],"FiLIP,":[33],"they":[34],"improved":[35],"their":[36,61],"first":[37],"using":[39,101],"whitening":[40,102,150],"keys":[41],"and":[42,53,71],"reduction":[43],"the":[45,64,81,89,107,132,149],"initial":[46],"key":[47],"register.":[48],"Later,":[49],"Cosseron":[50],"Hoffmann":[54],"proposed":[57],"successive":[58],"generalisations":[59],"work,":[62],"creating":[63],"new":[65],"families":[66],"Group":[68],"Permutators":[70,87,146],"then":[72],"Mixed":[73,85,125,144],"In":[76],"this":[77,143],"article,":[78],"we":[79,94,137],"prove":[80,138],"generic":[82],"security":[83,140],"in":[88,131],"Random":[90,133],"Oracle":[91,134],"Model.":[92,135],"Moreover,":[93],"study":[95],"derived":[97],"scheme":[98],"avoids":[100],"keys.":[103],"We":[104],"show":[105],"resulting":[108],"is":[110,129],"less":[111],"secure":[112,130],"by":[113],"providing":[114],"an":[115],"attack":[116],"some":[118],"parameter":[119],"choices":[120],"would":[122],"yield":[123],"Permutator":[127],"Finally,":[136],"bound":[141],"without":[148],"key.":[151]},"counts_by_year":[],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2026-03-17T00:00:00"}
